Category: HelpnetSecurity

Who owns customer identity? - Help Net Security
18
Apr
2024

Who owns customer identity? – Help Net Security

When I’m talking with prospective clients, I like to ask: which department owns customer identity? Everyone immediately looks towards a…

92% of enterprises unprepared for AI security challenges
18
Apr
2024

92% of enterprises unprepared for AI security challenges

Most industries continue to run almost two or more months behind in patching software vulnerabilities, endpoints remain vulnerable to threats,…

Bots dominate internet activity, account for nearly half of all traffic
18
Apr
2024

Bots dominate internet activity, account for nearly half of all traffic

49.6% of all internet traffic came from bots in 2023, a 2% increase over the previous year, and the highest…

Palo Alto firewalls: Public exploits, rising attacks, ineffective mitigation
17
Apr
2024

Palo Alto firewalls: Public exploits, rising attacks, ineffective mitigation

While it initially seemed that protecting Palo Alto Network firewalls from attacks leveraging CVE-2024-3400 would be as easy a disabling…

Cybersecurity jobs available right now: April 17, 2024
17
Apr
2024

Cybersecurity jobs available right now: April 17, 2024

Client Security Officer Unisys | USA | Remote – View job details The Client Security Officer (CSO) is part of…

Thinking outside the code: How the hacker mindset drives innovation
17
Apr
2024

Thinking outside the code: How the hacker mindset drives innovation

Keren Elazari is an internationally recognized security analyst, author, and researcher. Since 2000, Keren has worked with leading Israeli security…

Damn Vulnerable RESTaurant: Open-source API service designed for learning
17
Apr
2024

Damn Vulnerable RESTaurant: Open-source API service designed for learning

Damn Vulnerable RESTaurant is an open-source project that allows developers to learn to identify and fix security vulnerabilities in their…

IT and security professionals demand more workplace flexibility
17
Apr
2024

IT and security professionals demand more workplace flexibility

The concept of Everywhere Work is now much broader, encompassing where, when, and how professionals get their work done —…

PuTTY vulnerability can be exploited to recover private keys (CVE-2024-31497)
16
Apr
2024

PuTTY vulnerability can be exploited to recover private keys (CVE-2024-31497)

A vulnerability (CVE-2024-31497) in PuTTY, a popular SSH and Telnet client, could allow attackers to recover NIST P-521 client keys…

Cisco Duo provider breached, SMS MFA logs compromised
16
Apr
2024

Cisco Duo provider breached, SMS MFA logs compromised

Hackers have managed to compromise a telephony provider for Duo, the Cisco-owned company providing secure access solutions, and steal MFA…

Tanium Automate reduces manual processes for repeatable tasks
16
Apr
2024

Tanium Automate reduces manual processes for repeatable tasks

Alongside Tanium Guardian and its partnership with Microsoft Copilot for Security, Tanium Automate serves as another critical component in support…

New open-source project takeover attacks spotted, stymied
16
Apr
2024

New open-source project takeover attacks spotted, stymied

The OpenJS Foundation has headed off a “credible takeover attempt” similar to the one that resulted in a backdoor getting…